In this paper, we describe recent progress in space-division multiplexed (SDM) transmission, and our proposal and demonstration of Continue reading
Get Latest Final Year Computer Projects in your Email
IEEE Computer Projects
Cooperative Routing Protocol for Content-centric Networking
A typical Forwarding Information Based (FIB) construction in the Content Centric Networking (CCN) architecture relies on the Continue reading
Coded Downlink Multi-user MC-CDMA System using Transmitter Pre-processing :Performance Results
In this treatise, we evaluate the error-rate (ER) performance of turbo coded Multi-carrier Code division multiple access scheme (MC-CDMA) for Continue reading
Badges of Friendship: Social Influence and Badge Acquisition on Stack Overflow
Badges can provide a number of advantages to networked, self-directed learners, including making visible social networks of support and Continue reading
Extending Worst Case Response-Time Analysis for Mixed Messages in Controller Area Network With Priority and FIFO Queues
The existing worst case response-time analysis for controller area network (CAN) with nodes implementing priority and First In First Out (FIFO) queues does Continue reading
Automatic Estimation and Removal of Noise from a Single Image
Image denoising algorithms often assume an additive white Gaussian noise (AWGN) process that is independent of the actual RGB values. Such approaches cannot effectively Continue reading
A Secure Fast Handoff Scheme With Attribute-based Access Control for Secure Enterprise WLAN
Because of its flexibility and convenience, WLAN has been an essential technology for enterprise Network. It becomes a heated issue to improve the Continue reading
Rich Intrinsic Image Separation for Multi-View Outdoor Scenes
Intrinsic images aim at separating an image into its reflectance and illumination components to facilitate further analysis or manipulation. This separation is severely Continue reading
A Strategy to Manage Cache Consistency in a Disconnected Distributed Environment
Modern distributed systems involving large number of nonstationary clients (mobile hosts, MH) connected via unreliable low-bandwidth communication channels are very prone to Continue reading
A Robust Push-to-Talk Service for Wireless Mesh Network
Push-to-Talk (PTT) is a useful capability for rapidly deployable wireless mesh networks used by first responders. PTT allows several users to speak with each other while using a Continue reading
Modeling the Worm and Detection of the Camouflaging Worm
Active worms major security threats to the Internet. This is due to the ability of active worms to propagate in an automated fashion as they continuously compromise Continue reading